METHOD FOR PROTECTION SWITCHING IN ETHERNET RING NETWORK
Provided is a protection switching method via forwarding table correction in an Ethernet ring network. Upon detecting a failure in a link, a node generates a protection switching frame including an address list of a forwarding table corresponding to a port connected to the link, and transmits the protection switching frame to a port at an opposite direction of the link. A node that receives the protection switching frame deletes its own address from the address list included in the protection switching frame, and changes a port number of an address in the address list of the protection switching frame from among addresses of the forwarding table corresponding to a port that received the protection switching frame to a port number in an opposite direction of the port that received the protection switching frame or deletes the port number of the address in the address list.
The present invention relates to a protection switching method in an Ethernet ring network, and more particularly, to a protection switching method via transmission table correction of an Ethernet ring node.
The present invention is derived from a research project supported by the Information Technology (IT) Research & Development (R&D) program of the Ministry of Information and Communication (MIC) and the Institute for Information Technology Advancement (IITA) [2005-S-102-03, Carrier Class Ethernet Technology].
BACKGROUND ARTIn order to provide Ethernet ring protection switching, a forwarding table is prepared so that frame forwarding of each Ethernet node does not form an endless loop in an Ethernet ring. Such forwarding table is realized via a link blocking method and an active management method.
According to the link blocking method, a link included in a ring is deactivated so as to logically prevent the ring from forming as if the link does not exist, and endless loop transmission is prevented by preparing a forwarding table of each node by using an address learning method used in a general Ethernet media access control (MAC). Here, a block link is only logically determined, and a physical link of the block link exists. Thus, when such local block link is removed, transmission of traffic is immediately possible.
According to the active management method, a manager or a routing protocol manages contents of the forwarding table of each node, or endless loop transmission is prevented by combining the active management method and the address learning method. The active management method is highly efficient since the optimum path is provided via an effective forwarding table.
When a failure occurs in a conventional Ethernet ring network, a block link is removed if the block link logically exists in a ring, and endless loop transmission of the ring is prevented as a failure link provides a physical or logical block. When several Ethernet rings are combined, a block link of a ring where a failure is not occurred is newly selected so that the whole Ethernet network forms a spanning tree structure without a loop.
When a physical block link due to a failure and a block link for loop prevention are newly selected, a forwarding table is no longer valid, and thus all nodes require new forwarding tables. In order to prepare a new forwarding table, all nodes start a new address learning process. During the address learning process, a node, which received a frame including a destination address (DA) that is not yet learned, broadcasts the frame through all ports. Then, if a source address (SA) of a frame is not learned in the forwarding table, the SA of the frame and a port number that received the frame are recorded in the forwarding table. In other words, forwarding tables are all removed after protection switching, and thus whenever a frame having a new address that is not recorded in the forwarding table as a DA is received, the frame is copied and transmitted towards the both direction of a ring. Accordingly, the larger amount of frames than a normal state is provided in the Ethernet ring network until all SAs are learned.
In other words, since a protection switching technology in a conventional ring network deletes and initiates forwarding table information, a transition phenomenon occurs, where the amount of traffic overshoots after protection switching. In order to prevent a packet loss due to such transmission phenomenon, the link amount of the ring network or the bandwidth of the ring network should be obtained more than necessary, which is inefficient.
When the link amount or the bandwidth of the ring network is limited, a large capacity buffer may be used in order to prevent the packet loss. However in this case, prompt protection switching (protection switching within 50 ms generally required in a real time voice communication centered network) cannot be provided.
DETAILED DESCRIPTION OF THE INVENTION Technical ProblemThe present invention provides a protection switching method which solves a problem of an ineffective protection switching technology in an Ethernet ring network, and settles a transition phenomenon where the traffic amount overshoots after protection switching.
The present invention also provides an effective protection switching method which uses a share node in an Ethernet multi-ring network.
Technical SolutionAccording to an aspect of the present invention, there is provided a protection switching method of a node connected to a link having a failure in a ring network, the protection switching method including: generating a protection switching frame including an address list of a forwarding table corresponding to a port connected to the link; and transmitting the protection switching frame.
According to another aspect of the present invention, there is provided a protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method including: receiving the protection switching frame; deleting an address of the node from an address list included in the protection switching frame; and correcting a port number of an address included in the address list from among addresses of a forwarding table of the node corresponding to a port that received the protection switching frame to a port number at an opposite direction of the port that received the protection switching frame.
According to another aspect of the present invention, there is provided a protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method including: receiving the protection switching frame; deleting an address of the node from an address list included in the protection switching frame; and deleting a port number of an address included in the address list from among addresses of a forwarding table of the node corresponding to a port that received the protection switching frame to a port number at an opposite direction of the port that received the protection switching frame.
According to another aspect of the present invention, there is provided a protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method including: receiving the protection switching frame; deleting an address of the node from an address list included in the protection switching frame; and deleting an address of the forwarding table of the node corresponding to a port connected to an external network of the ring network, from the address list of the protection switching frame.
According to another aspect of the present invention, there is provided a protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method including: receiving the protection switching frame; deleting an address of the node from an address list included in the protection switching frame; and discarding the protection switching frame when an address no longer exists in the address list.
According to another aspect of the present invention, there is provided a to protection switching method of a share node connected to a share link having a failure in a multi-ring network, the protection switching method including: generating a protection switching frame for each ring; and transmitting the protection switching frame to the each ring, wherein the protection switching frame comprises from among addresses of a forwarding table of the share node: an address corresponding to a port connected to the share link while belonging to a ring that is to transmit the protection switching frame; and an address corresponding to a blocked port in a neighboring ring direction while belonging to a neighboring ring instead of the ring that is to transmit the protection switching frame.
Advantageous EffectsAccording to the present invention, quick protection switching is provided in an Ethernet ring network, and an overshoot transition phenomenon that occurs after the protection switching is reduced by using a protection switching frame that does not require large bandwidth and is effective. Also, by reducing a network bandwidth and unnecessary usage of a buffer, resources and expenses can be reduced.
Also, by using a block bridge using first and second share nodes in an Ethernet multi-ring network, protection switching within 50 ms can be effectively provided without a conventional overshoot transition phenomenon.
The present invention will now be described more fully with reference to the accompanying drawings, in which exemplary embodiments of the invention are shown.
An Ethernet ring network is formed of Ethernet nodes. An Ethernet node includes a plurality of Ethernet ports. At least two Ethernet ports of each Ethernet node are connected to a link that is connected to a neighbouring Ethernet node so as to form a ring. Other Ethernet ports are connected to an Ethernet network outside the Ethernet ring network.
The Ethernet ring network may have a physical ring form, or a logical ring form in a predetermined network that is physically connected. A logical ring may be formed of a ring that uses a block link and a ring that does not use a block link. The present invention provides a protection switching method that can be commonly used in both rings.
A protection switching method of an Ethernet ring network according to the present invention will now be described with reference to the accompanying drawings.
According to a method of deactivating a link, a port of any one node from among nodes at both ends of the link may be blocked or all ports of the nodes at the both ends of the link may be blocked.
In
When a failure occurs in a failure link 120 between nodes A and B, the nodes A and B, upon detecting the failure, transmit an automatic protection switching (APS) frame to a link in an opposite direction of the failure link 120. Accordingly, a block of the block link 110 between the nodes C and D is removed, and the block link 110 is activated. At this time, the nodes A and B change a port number of all addresses of a forwarding table corresponding to a port connected to the failure link 120 to a port number connected to the link in the opposite direction of the failure link 120 so that a frame is not transmitted to the failure link 120. Simultaneously, the nodes A and B load an address list of the forwarding table corresponding to the port connected to the failure link 120 on a payload of the protection switching frame. In other words, the node A loads an address list of a forwarding table having a port number connected to the failure link 120, i.e. media access control (MAC) addresses of the nodes B and C, on the payload of the protection switching frame. A structure of the protection switching frame illustrated in
A node that received the protection switching frame determines whether its own MAC address is included in the address list loaded on the payload of the protection switching frame, and if the MAC address is included, the MAC address is deleted from the address list. For example, when the node C receives a protection switching frame generated in the node A, the node C deletes its own MAC address C from an address list (B, C) included in the protection switching frame, and then transmits the protection switching frame to the node D.
Also, the node that received the protection switching frame determines whether an address to which a port connected to an external network is assigned exists in the address list of the protection switching frame, and if the address exists, the address is deleted from the address list of the protection switching frame. Also, the node recognizes addresses, to which a port that received the protection switching frame is assigned, from the forwarding table, and changes a port number corresponding to an address in the address list of the protection switching frame from among the recognized addresses to a port number in an opposite direction of the port that received the protection switching frame or deletes the port number corresponding to the address in the address list. After all nodes performed above processes, the corrected forwarding table of each node provides protection switching that transmits a packet without using the failure link 120.
Referring to
Also, the nodes C and D, upon detecting the failure, each generates a protection switching frame including the address list whose port numbers are changed in the forwarding table, and transmits the protection switching frame to an opposite direction of the port with the failure. In other words, the protection switching frame loads the address list of the forwarding table where the link or the port with the failure is assigned. The nodes C and D multicast the protection switching frame.
Upon receiving the protection switching frame, another node excluding the node that detected the failure updates its own forwarding table by performing the same operation as described in
A normal node in a non-failure state receives two protection switching frames each generated in two nodes at the both ends of a failure link. If the normal node does not delete its own address or the like from address lists of the protection switching frames, corrections in a forwarding table of the normal node made by the pre-received protection switching frame may be changed again by the post-received protection switching frame. In other words, if the address of the already passed node and an address of an external node connected to the node are left in the address list of the post-received protection switching frame, the corrections in the forwarding table of the node corrected by the pre-received protection switching frame may be changed again by the post-received protection switching frame. In order to prevent such phenomenon, the address of a node that received the protection switching frame and the address of an external node connected to the node should be deleted from the address list loaded on the payload of the protection switching frame.
Also, when an address of a forwarding table to which a port that received the protection switching frame is assigned is included in the address list loaded in the protection switching frame, a port number of such address is changed to a port number in an opposite direction of the port that received the protection switching frame or deleted from the forwarding table.
Referring to
When the node C receives the protection switching frame, since a destination address of the protection switching frame and the address of the node C are the same, the protection switching frame is discarded. In this manner, the protection switching frame is transmitted to one direction when the one-way failure occurs so as to perform a protection switching function.
Referring to
Referring to
After such deleting processes, the node discards the protection switching frame if the address list does not exist in the payload of the protection switching frame. If an address is left in the payload, the node determines whether a same address exists by comparing an address list in its own forwarding table and the address list in the payload in operation S540. If the same address exists, a port number corresponding to the same address in the forwarding table is changed to an opposite port number of a logical ring formed of a virtual local area network (VLAN) in operation S550, and the protection switching frame is transmitted to a next ring node in operation S560. When each node of the Ethernet ring performs the protection switching process, a forwarding table providing a protection switching function is prepared.
Referring to
Referring to
Each of nodes C, D, and E receives the protection switching frame, deletes its own MAC address from an MAC address list of the received protection switching frame, and changes an MAC address overlapping with the forwarding table of the port that received the protection switching frame from among the left MAC addresses to a forwarding table of an opposite port of the node. Then, the protection switching frame is transmitted to a next node. When the forwarding tables of all nodes that received the protection switching frame are changed, a protection switching function is provided, and remaining links excluding the link with the failure are used.
In the above, a protection switching method in a single Ethernet ring network is described. Hereinafter, a protection switching method in an Ethernet multi-ring network, wherein at least one ring is overlapped, is described.
Multi-rings are connected by at least one share node and a share link between share nodes. Each ring includes at least one block port or a block link so as to prevent an endless loop from occurring. When a failure occurs in the share link and the block port or the lock link is removed, one big ring wherein two rings are combined is formed, and thus any one bridge that connects the two rings from the bridges of the share nodes should be blocked so as to prevent an endless loop in the big ring.
In order to classify each ring in the Ethernet multi-ring network, a VLAN identification (ID) is assigned to each ring. Accordingly, each node can determine whether a ring exists in the same ring or a different ring in the multi-ring network based on the VLAN ID included in a header of a received packet. Specifically, a VLAN ID field is included in a forwarding table of the share node. Alternatively, when the multi-ring network is a general network, each ring is classified by a virtual private network (VPN) assigned number. When the multi-ring network is a label switching network, each ring may be classified by a multicast label. In addition, based on a type of the multi-ring network, various identifications may be used according to the corresponding type.
Referring to
Referring to
When a failure occurs in a share link between the share nodes B and C, the share nodes B and C respectively block ports 2 and 3 connected to the share link, and the nodes A and E removes a previous block port. Accordingly, since two rings form one big ring, the share nodes B or C should block a bridge that connects the two rings so as to prevent the loop occurrence. In the current embodiment, the share node C blocks the bridge.
The share nodes B and C each transmit a protection switching frame to a ring. The share nodes B and C each generate the protection switching frame including an address corresponding to a blocked port number from among addresses of the forwarding table of a ring that receives the protection switching frame from a share node, and an address corresponding to a blocked port number in a neighboring ring from among addresses of a forwarding table of the neighboring ring instead of the ring that receives the protection switching frame from a share node.
For example, when the protection switching frame is transmitted to the first ring network, the share node B recognizes destination addresses A, C, D, and X of the nodes of the first ring network from the forwarding table based on the VLAN ID (M), generates the protection switching frame including the addresses C, D, and X having the blocked port 2, and transmits the protection switching frame to the first ring network. The protection switching frame is generated in the same manner when the share node B transmits the protection switching frame to the second ring network.
Alternatively, when the share node C that includes a bridge block transmits a protection switching frame to the first ring network, the share node B recognizes addresses A, B, D, and X of the nodes of the first ring network from the forwarding table based on the VLAN ID (M), and recognizes the addresses A and B including the blocked port 3 in the first ring network. The share node C recognizes addresses B, E, F, and Y of nodes of the second ring network from the forwarding table based on the VLAN ID (N), and recognizes the addresses E, F, and Y including the blocked port 32 in the second ring network whose bridge is blocked. Then, the share node C transmits the protection switching frame including the recognized addresses A, B, E, F, and Y to the first ring network. The share node C generates the protection switching node in the same manner even when the protection switching frame is to be transmitted to the second ring network.
The share nodes B and C each change a blocked port number in the forwarding table to a port number in an opposite direction of the failure. The share nodes B and C include two ports in an opposite direction of the share link, i.e. one port each that faces each ring. Accordingly, the share nodes B and C recognize to which ring an address, whose port number is to be changed in the forwarding table, belongs, and change the address to the a port number of the corresponding ring.
For example, the share node B changes a port number of the addresses C, D, and X having the block port 2 from among the addresses A, C, D, and X that belongs to the first ring network whose VLAN ID is M in the forwarding table to a port 21 in the opposite direction. Also, the share node B changes a port number of the addresses E, F, and Y having the block port 2 from among the addresses C, E, F, and Y that belongs to the second ring network whose VLAN ID is N to a port 22. Here, since the port number of the address C is already changed, it is not required to be changed again. However, the port number of the address C may be changed again. The forwarding table of the share node C is updated according to the same manner.
Referring to
When a failure occurs in the share link between the share nodes A and B, the share node A, upon detecting the failure, assigns a port 21 as a block port, and a bridge connecting two rings as a block bridge. Also, the share node B, upon detecting the failure, blocks a port 2. The share nodes A and B generates and transmits a protection switching frame in the same manner as described with reference to
Referring to
In operation S1110, it is determined whether a node that detected the failure is a share node or a general node in the multi-ring network. If the node that detected the failure is a general node, the node blocks a port connected to the link having the failure in operation S1165, changes a port number of the blocked port to a port number in an opposite direction of the failure in a forwarding table in operation S1170, generates a protection switching frame including addresses of the forwarding table whose port number is changed in operation S1175, and transmits the protection switching frame to the port in the opposite direction of the failure in operation S1145.
If it is determined that the node that detected the failure is a share node in operation S1110, the node determines whether the defected link is a share link or a general link in operation S1115. If the defected link is the general link, the share node blocks a port in a direction of the defected link in operation S1130, changes a port number of addresses corresponding to the blocked port to a port number in the opposite direction of the failure in the forwarding table in operation S1135, generates a protection switching frame including an address list of the addresses whose port number is changed in operation S1140, and transmits the protection switching frame to the port in the opposite direction of the failure in operation S1145. Since the protection switching frame includes a VLAN ID indicating each ring in the multi-ring network, the protection switching frame is transmitted within only one ring.
If it is determined that the node that detected the failure is the share node in operation S1110 and that the defected link is a share link in operation S1115, the share node blocks a bridge connecting two rings in operation S1150 so as to prevent a loop phenomenon in one big ring network formed by two connected ring networks. When two share nodes exist as in
Referring to
Then, if it is determined that an address of the forwarding table corresponding to a port that received the protection switching frame is included in the address list in operation S1240, the general node changes a port number of the address to a port number in an opposite direction of the port that received the protection switching frame in operation S1250. Then, the general node multicasts the protection switching frame to a next ring node in operation S1260.
The invention can also be embodied as computer readable codes on a computer readable recording medium. The computer readable recording medium is any data storage device that can store data which can be thereafter read by a computer system. Examples of the computer readable recording medium include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (such as data transmission through the Internet). The computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
While this invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. The preferred embodiments should be considered in descriptive sense only and not for purposes of limitation. Therefore, the scope of the invention is defined not by the detailed description of the invention but by the appended claims, and all differences within the scope will be construed as being included in the present invention.
Claims
1. A protection switching method of a node connected to a link having a failure in a ring network, the protection switching method comprising:
- generating a protection switching frame including an address list of a forwarding table corresponding to a port connected to the link; and
- transmitting the protection switching frame.
2. The protection switching method of claim 1, wherein the transmitting comprises transmitting the protection switching frame to a port at an opposite direction of the link.
3. The protection switching method of claim 1, further comprising correcting a port number of addresses of the forwarding table corresponding to the port connected to the link to a port number at the opposite direction of the link.
4. The protection switching method of claim 1, wherein the detecting of the failure comprises:
- periodically transceiving a continuity check frame with neighboring nodes;
- initiating a timer when the continuity check frame is received; and
- detecting a failure of a link that receives the continuity check frame, when the continuity check frame is not received until the timer expires.
5. A protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method comprising:
- receiving the protection switching frame;
- deleting an address of the node from an address list included in the protection switching frame; and
- correcting a port number of an address included in the address list from among addresses of a forwarding table of the node corresponding to a port that received the protection switching frame to a port number at an opposite direction of the port that received the protection switching frame.
6. The protection switching method of claim 5, further comprising deleting an address of the forwarding table of the node corresponding to a port connected to an external network of the ring network, from the address list of the protection switching frame.
7. The protection switching method of claim 5, further comprising discarding the protection switching frame when an address no longer exists in the address list.
8. A protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method comprising:
- receiving the protection switching frame;
- deleting an address of the node from an address list included in the protection switching frame; and
- deleting a port number of an address included in the address list from among addresses of a forwarding table of the node corresponding to a port that received the protection switching frame to a port number at an opposite direction of the port that received the protection switching frame.
9. A protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method comprising:
- receiving the protection switching frame;
- deleting an address of the node from an address list included in the protection switching frame; and
- deleting an address of the forwarding table of the node corresponding to a port connected to an external network of the ring network, from the address list of the protection switching frame.
10. A protection switching method of a node receiving a protection switching frame in a ring network, the protection switching method comprising:
- receiving the protection switching frame;
- deleting an address of the node from an address list included in the protection switching frame; and
- discarding the protection switching frame when an address no longer exists in the address list.
11. A protection switching method of a share node connected to a share link having a failure in a multi-ring network, the protection switching method comprising:
- generating a protection switching frame for each ring; and
- transmitting the protection switching frame to the each ring,
- wherein the protection switching frame comprises from among addresses of a forwarding table of the share node:
- an address corresponding to a port connected to the share link while belonging to a ring that is to transmit the protection switching frame; and
- an address corresponding to a blocked port in a neighboring ring direction while belonging to a neighboring ring instead of the ring that is to transmit the protection switching frame.
12. The protection switching method of claim 11, wherein the transmitting comprises transmitting the protection switching frame to the each ring via a port that exists at opposite direction of the share link.
13. The protection switching method of claim 11, further comprising the share node blocking a bridge connecting two rings.
14. The protection switching method of claim 9, further comprising the share node recognizing addresses of the forwarding table corresponding to the port connected to the share link, and changing a port number of the recognized addresses to a port number of a ring to which the recognized addresses belong from among port numbers connected to each ring and existing in an opposite direction of the share link.
15. The protection switching method of claim 11, wherein, when the multi-ring network is an Ethernet, each ring is classified by a virtual local area network (VLAN) identification (ID).
16. The protection switching method of claim 11, wherein each ring is classified by a virtual private network (VPN) assigned number in the multi-ring network.
17. The protection switching method of claim 11, wherein, when the multi-ring network is a label switching network, each ring is classified by a multicast label.
Type: Application
Filed: Mar 31, 2008
Publication Date: May 6, 2010
Inventors: Jeong-Dong Ryoo (Daejeon-city), June-Koo Rhee (Daejeon-city), Jin-Sung Im (Ulsan-city), Bheom-Soon Joo (Daejeon-city), Young-Sun Kim (Daejeon-city), Zahir Uddin Ahmad (Daejeon-city)
Application Number: 12/593,955
International Classification: G06F 11/00 (20060101); H04L 12/26 (20060101);